Booknews

Infrastructure network consultant Skoudis provides a step-by-step guide that will help network and system administrators defend their information and computing assets, whether or not they have had security experience. The 13 chapters discuss a hacker's view of networks, TCP/IP protocols, and their vulnerabilities; five phases of hacking (reconnaissance, scanning, gaining and maintaining access, and preventing detection); the most dangerous and widespread attack scenarios; key hacker tools and how they work to build elegant attacks from simple building blocks; detecting and preventing IP spoofing, covert channels, denial of service, and other key attacks; how to uncover the handiwork of hackers; and a preview of tomorrow's hacker tools, attacks, and countermeasures. Annotation c. Book News, Inc., Portland, OR (booknews.com)